From a2f57d4e6aa7169d2b5f5982f0c96ba3f654d09a Mon Sep 17 00:00:00 2001 From: Victor Ramos Mello <772792+m0nad@users.noreply.github.com> Date: Fri, 6 Mar 2020 13:50:26 +0100 Subject: [PATCH] Add privilege escalation guides by HackTricks --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index bc26248..3ab8a51 100644 --- a/README.md +++ b/README.md @@ -38,6 +38,7 @@ A curated list of awesome privilege escalation - [Linux elevation of privileges ToC](https://guif.re/linuxeop) - [Linux - Privilege Escalation](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md) - [Linux Privilege Escalation](https://percussiveelbow.github.io/linux-privesc/): an introduction to Linux escalation techniques, mainly focusing on file/process permissions, but along with some other stuff too. + - [Linux Privilege Escalation](https://book.hacktricks.xyz/linux-unix/privilege-escalation): by HackTricks - [Linux Privilege Escalation via Dynamically Linked Shared Object Library](https://www.contextis.com/en/blog/linux-privilege-escalation-via-dynamically-linked-shared-object-library): How RPATH and Weak File Permissions can lead to a system compromise. - [Local Linux Enumeration & Privilege Escalation Cheatsheet](https://www.rebootuser.com/?p=1623): a few Linux commands that may come in useful when trying to escalate privileges on a target system. - [Local Linux Enumeration & Privilege Escalation](https://hackingandsecurity.blogspot.com/2016/05/local-linux-enumeration-privilege.html): a few Linux commands that may come in useful when trying to escalate privileges on a target system. @@ -123,6 +124,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info - [Privilege Escalation Windows](https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html) - [Privilege escalation: Windows](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-windows) - [Windows elevation of privileges ToC](https://guif.re/windowseop) + - [Windows Local Privilege Escalation](https://book.hacktricks.xyz/windows/windows-local-privilege-escalation): by HackTricks - [Windows Post Gather Modules](https://www.offensive-security.com/metasploit-unleashed/windows-post-gather-modules/): Metasploit offers a number of post exploitation modules that allow for further information gathering on your target network. - [Windows Priv Esc](https://www.sock-raw.org/wiki/doku.php/windows_priv_esc) - [Windows Privilege Escalation Fundamentals](https://www.fuzzysecurity.com/tutorials/16.html) @@ -132,6 +134,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info - [Windows Privilege Escalation](http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation) - [Windows Privilege Escalations](https://www.exploit-db.com/docs/46131) + ### DLL Hijacking - [DLL Hijacking](https://ired.team/offensive-security/privilege-escalation/t1038-dll-hijacking): DLL Search Order Hijacking for privilege escalation, code execution, etc. by Red Teaming Experiments - [DLL Hijacking](https://pentestlab.blog/2017/03/27/dll-hijacking/): by PentestLab @@ -139,6 +142,7 @@ is intended to be executed locally on a Linux box to enumerate basic system info - [PrivEsc: DLL Hijacking](https://gracefulsecurity.com/privesc-dll-hijacking/) - [Windows Privilege Escalation via DLL Hijacking](https://hacknpentest.com/windows-privilege-escalation-dll-hijacking/): Crystal-clear view on one of the most used techniques for privilege escalation by the Threat Actors. by HacknPentest + ### Potato - [Hot Potato](https://pentestlab.blog/2017/04/13/hot-potato/): Hot potato is the code name of a Windows privilege escalation technique that was discovered by Stephen Breen. This technique is actually a combination of two known windows issues like NBNS spoofing and NTLM relay with the implementation of a fake WPAD proxy server which is running locally on the target host. - [Hot Potato](https://securityonline.info/hot-potato-windows-privilege-escalation-metasploit-powershellhot-potato-windows-privilege-escalation/): Windows 7, 8, 10, Server 2008, Server 2012 Privilege Escalation in Metasploit & PowerShell.